Install and assign Configuration Manager clients using Microsoft Entra ID for authentication
To install the Configuration Manager client on Windows devices using Microsoft Entra authentication, integrate Configuration Manager with Microsoft Entra ID. Clients can be on the intranet communicating directly with an HTTPS-enabled management point or any management point in a site enabled for Enhanced HTTP. They can also be internet-based communicating through the CMG or with an Internet-based management point. This process uses Microsoft Entra ID to authenticate clients to the Configuration Manager site. Microsoft Entra ID replaces the need to configure and use client authentication certificates.
Setting up Microsoft Entra ID may be easier for some customers than setting up a public key infrastructure for certificate-based authentication. There are features that require you onboard the site to Microsoft Entra ID, but don't necessarily require the clients to be Microsoft Entra joined. For more information, see the following articles:
Before you begin
A Microsoft Entra tenant is a prerequisite
A supported version of Windows 10 or later
Joined to Microsoft Entra ID, either pure cloud domain-joined, or Microsoft Entra hybrid joined
The signed in user must be a Microsoft Entra identity.
If the user is a federated or synchronized identity, configure both Configuration Manager Active Directory user discovery and Microsoft Entra user discovery. For more information about hybrid identities, see Define a hybrid identity adoption strategy.
In addition to the existing prerequisites for the management point site system role, also enable ASP.NET 4.5 on this server. Include any other options that are automatically selected when enabling ASP.NET 4.5.
Determine whether your management point needs HTTPS. For more information, see Enable management point for HTTPS.
Optionally set up a cloud management gateway (CMG) to deploy internet-based clients. For on-premises clients that authenticate with Microsoft Entra ID, you don't need a CMG.
Configuration Manager extends its support for internet-based devices that don't often connect to the internal network, aren't able to join Microsoft Entra ID, and don't have a method to install a PKI-issued certificate. For more information, see Token-based authentication for CMG.
Configure Azure Services for Cloud Management
Connect your Configuration Manager site to Microsoft Entra ID as the first step. For details of this process, see Configure Azure services. Create a connection to the Cloud Management service.
Enable Microsoft Entra user Discovery as part of onboarding to Cloud Management.
After you complete these actions, your Configuration Manager site is connected to Microsoft Entra ID.
If your devices are in a Microsoft Entra tenant that's separate from the tenant with a subscription for the CMG compute resources, starting in version 2010 you can disable authentication for tenants not associated with users and devices. For more information, see Configure Azure services.
Configure client settings
These client settings help configure Windows devices to be hybrid-joined. They also enable internet-based clients to use the CMG.
Configure the following client settings in the Cloud Services group. For more information, see How to configure client settings.
Allow access to cloud distribution point: Enable this setting to help internet-based devices get the required content to install the Configuration Manager client. Devices can get the content from the CMG.
Automatically register new Windows 10 or later domain joined devices with Microsoft Entra ID: Set to Yes or No. The default setting is Yes. This behavior is also the default in Windows.
Hybrid-joined devices are joined to an on-premises Active Directory domain and registered with Microsoft Entra ID. For more information, see Microsoft Entra hybrid joined devices.
Enable clients to use a cloud management gateway: Set to Yes (default), or No.
Deploy the client settings to the required collection of devices. Don't deploy these settings to user collections.
To confirm the device is hybrid-joined, run
dsregcmd.exe /status in a command prompt. If the device is Microsoft Entra joined or hybrid-joined, the AzureAdjoined field in the results shows YES. For more information, see dsregcmd command - device state.
Install and register the client using Microsoft Entra identity
To manually install the client using Microsoft Entra identity, first review the general process on How to install clients manually.
The device needs access to the internet to contact Microsoft Entra ID, but doesn't need to be internet-based.
The following example shows the general structure of the command line:
ccmsetup.exe /mp:<source management point> CCMHOSTNAME=<internet-based management point> SMSSITECODE=<site code> SMSMP=<initial management point> AADTENANTID=<Azure AD tenant identifier> AADCLIENTAPPID=<Azure AD client app identifier> AADRESOURCEURI=<Azure AD server app identifier>
For more information, see Client installation properties.
/mp parameter and
CCMHOSTNAME property specify one of the following, depending upon the scenario:
- On-premises management point. Only specify the
CCMHOSTNAMEproperty isn't required.
- Cloud management gateway
- Internet-based management point
SMSMP property specifies the on-premises management point. It's not required. It's recommended for Microsoft Entra joined devices that roam onto the intranet, so they can find an on-premises management point.
This example uses a cloud management gateway. It replaces sample values:
ccmsetup.exe /mp:https://CONTOSO.CLOUDAPP.NET/CCM_Proxy_MutualAuth/72186325152220500 CCMHOSTNAME=CONTOSO.CLOUDAPP.NET/CCM_Proxy_MutualAuth/72186325152220500 SMSSITECODE=ABC SMSMP=https://mp1.contoso.com AADTENANTID=daf4a1c2-3a0c-401b-966f-0b855d3abd1a AADCLIENTAPPID=7506ee10-f7ec-415a-b415-cd3d58790d97 AADRESOURCEURI=https://contososerver
The site publishes additional Microsoft Entra information to the cloud management gateway (CMG). A Microsoft Entra joined client gets this information from the CMG during the ccmsetup process, using the same tenant to which it's joined. This behavior further simplifies installing the client in an environment with more than one Microsoft Entra tenant. The only two required ccmsetup properties are
To automate the client install using Microsoft Entra identity via Microsoft Intune, see How to prepare internet-based devices for co-management.
Once complete, you can continue to monitor and manage clients.